To see the other types of publications on this topic, follow the link: Routing protocol evaluation.

Dissertations / Theses on the topic 'Routing protocol evaluation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Routing protocol evaluation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Lopez-Fernandez, Pedro A. "Routing Protocol Performance Evaluation for Mobile Ad-hoc Networks." UNF Digital Commons, 2008. http://digitalcommons.unf.edu/etd/293.

Full text
Abstract:
Currently, MANETs are a very active area of research, due to their great potential to provide networking capabilities when it is not feasible to have a fixed infrastructure in place, or to provide a complement to the existing infrastructure. Routing in this kind of network is much more challenging than in conventional networks, due to its mobile nature and limited power and hardware resources. The most practical way to conduct routing studies of MANETs is by means of simulators such as GloMoSim. GloMoSim was utilized in this research to investigate various performance statistics and draw compa
APA, Harvard, Vancouver, ISO, and other styles
2

Teo, Cheng Kiat Amos. "Performance evaluation of a routing protocol in wireless sensor network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Dec%5FTeo.pdf.

Full text
Abstract:
Thesis (M.S. in Electrical Engineering)--Naval Postgraduate School, December 2005.<br>Thesis Advisor(s): Gurminder Singh, John C. McEachen. Includes bibliographical references (p.57-60). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
3

Yan, Shuqian. "Implementation and evaluation of QoSMIC, a new Internet multicast routing protocol." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0003/MQ45998.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Osękowska, Ewa A. "Performance Evaluation of Wireless Mesh Networks Routing Protocols." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3712.

Full text
Abstract:
The tremendous growth in the development of wireless networking techniques attracts growing attention to this research area. The ease of development, low installation and maintenance costs and self healing abilities are some of the qualities that make the multi-hop wireless mesh network a promising solution for both - rural and urban environments. Examining the performance of such a network, depending on the external conditions and the applied routing protocol, is the main aim of this research. It is addressed in an empirical way, by performing repetitive multistage network simulations followe
APA, Harvard, Vancouver, ISO, and other styles
5

He, Chengxuan. "Performance evaluation of multicast routing protocol in WiMAX multi-hop relay environment." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/27591.

Full text
Abstract:
Multicast/Broadcast Service (MBS) in WiMAX refers to the ability of the WiMAX network to provide flexible and efficient mechanisms to send common content to multiple users who are sharing radio resources. WiMAX multi-hop relay technology is a key enabler to expand WiMAX infrastructure to eliminate blind spots in coverage and to enhance user throughput with a lower capital expenditure and operational expenditure. To support MBS in a WiMAX multi-hop relay network, one must consider several design issues such as the dynamic relay topology discovery in response to the mobility of the relay station
APA, Harvard, Vancouver, ISO, and other styles
6

Chalabianloo, Niaz. "Routing And Security In Wireless Sensor Networks, An Experimental Evaluation Of A Proposed Trust Based Routing Protocol." Master's thesis, METU, 2013. http://etd.lib.metu.edu.tr/upload/12615749/index.pdf.

Full text
Abstract:
Satisfactory results obtained from sensor networks and the ongoing development in electronics and wireless communications have led to an impressive boost in the number of applications based on WSNs. Along with the growth in popularity of WSNs, previously implemented solutions need further improvements and new challenges arise which need to be solved. One of the main concerns regarding WSNs is the existence of security threats against their routing operations. Likelihood of security attacks in a structure suffering from resource constraints makes it an important task to choose proper security
APA, Harvard, Vancouver, ISO, and other styles
7

Lee, Young-Jun. "Routing and Efficient Evaluation Techniques for Multi-hop Mobile Wireless Networks." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7455.

Full text
Abstract:
In this dissertation, routing protocols, load-balancing protocols, and efficient evaluation techniques for multi-hop mobile wireless networks are explored. With the advancements made in wireless communication and computer technologies, a new type of mobile wireless network, known as a mobile ad hoc network (MANET), has drawn constant attention. In recent years, several routing protocols for MANETs have been proposed. However, there still remains the need for mechanisms for better scalability support with respect to network size, traffic volume, and mobility. To address this issue, a new metho
APA, Harvard, Vancouver, ISO, and other styles
8

Khan, Nabeel Pervaiz. "Performance evaluation of on demand multicast routing protocol for ad hoc wireless networks." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file, 56 p, 2009. http://proquest.umi.com/pqdweb?did=1891510831&sid=1&Fmt=2&clientId=8331&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Khengar, Piyush. "Design and performance evaluation of a new routing protocol for mobile ad hoc networks." Thesis, King's College London (University of London), 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.408590.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jabbour, Abdallah W. (Abdallah Wahib) 1980. "Design and evaluation of AMPER : a probabilistic routing protocol for mobile ad hoc networks." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/28360.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Civil and Environmental Engineering, 2004.<br>Includes bibliographical references (p. 89-91).<br>An ad hoc network is a group of mobile nodes that autonomously establish connectivity via multi-hop wireless links, without relying on any pre-configured network infrastructure. Traditional ad hoc routing protocols use a large number of routing packets to adapt to network changes, thereby reducing the amount of bandwidth left to carry data. Moreover, they route data packets along a single path from source to destination, which introduce
APA, Harvard, Vancouver, ISO, and other styles
11

Ibrahim, Idris Skloul. "A new routing protocol for ad hoc wireless networks design, implementation and performance evaluation." Thesis, Heriot-Watt University, 2011. http://hdl.handle.net/10399/2472.

Full text
Abstract:
A collection of mobile nodes can form a multi-hop radio network with a dynamic topology and without the need for any infrastructure such as base stations or wired network. Such a Mobile Ad Hoc Networks (MANETs) maintain their structure and connectivity in a decentralised and distributed fashion. Each mobile node acts as both a router for other nodes traffic, as well as a source of traffic of its own In this thesis we develop and present a new hybrid routing protocol called Multipath Distance Vector Zone Routing Protocol, which is referred to as MDVZRP. In MDVZRP we assume that all the routes i
APA, Harvard, Vancouver, ISO, and other styles
12

Liu, Hui. "Topology Control, Routing Protocols and Performance Evaluation for Mobile Wireless Ad Hoc Networks." Digital Archive @ GSU, 2006. http://digitalarchive.gsu.edu/cs_diss/3.

Full text
Abstract:
A mobile ad-hoc network (MANET) is a collection of wireless mobile nodes forming a temporary network without the support of any established infrastructure or centralized administration. There are many potential applications based the techniques of MANETs, such as disaster rescue, personal area networking, wireless conference, military applications, etc. MANETs face a number of challenges for designing a scalable routing protocol due to their natural characteristics. Guaranteeing delivery and the capability to handle dynamic connectivity are the most important issues for routing protocols in MA
APA, Harvard, Vancouver, ISO, and other styles
13

Lundgren, Henrik. "Implementation and Experimental Evaluation of Wireless Ad hoc Routing Protocols." Doctoral thesis, Uppsala : Acta Universitatis Upsaliensis : Univ.-bibl. [distributör], 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-4806.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Etorban, Ali Abdalla. "The design and performance evaluation of a proactive multipath routing protocol for mobile ad hoc networks." Thesis, Heriot-Watt University, 2012. http://hdl.handle.net/10399/2558.

Full text
Abstract:
Due to unpredictable network topology changes, routing in Mobile Ad Hoc Networks (MANET) is an important and challenging research area. The routing protocol should detect and maintain a good route(s) between source and destination nodes in these dynamic networks. Many routing protocols have been proposed for mobile ad hoc networks, and none can be considered as the best under all conditions. This thesis presents the design and implementation of a new proactive multipath MANET routing protocol. The protocol, named Multipath Destination Sequenced Distance Vector (MDSDV), is based on the well kno
APA, Harvard, Vancouver, ISO, and other styles
15

Kermajani, Hamidreza. "Contributions to the performance evaluation and improvement of the IPv6 routing protocol for low-power and lossy networks." Doctoral thesis, Universitat Politècnica de Catalunya, 2014. http://hdl.handle.net/10803/279368.

Full text
Abstract:
Wireless Sensor Networks (WSNs) have become increasingly important. These networks comprise sensor and actuator nodes that enable intelligent monitoring and control applications in a wide spectrum of environments including smart cities, home automation, remote health and precision agriculture to mention a few. In certain IETF circles, networks of these characteristics are called Low Power and Lossy Networks (LLNs). Whereas most LLN protocol architectures were born without native IP support, there exists a tendency in the market towards IP convergence, since IP-based LLNs offer an open and tan
APA, Harvard, Vancouver, ISO, and other styles
16

Gajurel, Sanjaya. "Multi-Criteria Direction Antenna Multi-Path Location Aware Routing Protocol for Mobile Ad Hoc Networks." Case Western Reserve University School of Graduate Studies / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=case1197301773.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Almotiri, Sultan H. "Design and Evaluation of Security Mechanism for Routing in MANETs. Elliptic Curve Diffie-Hellman cryptography mechanism to secure Dynamic Source Routing protocol (DSR) in Mobile Ad Hoc Network (MANET)." Thesis, University of Bradford, 2013. http://hdl.handle.net/10454/5718.

Full text
Abstract:
Ensuring trustworthiness through mobile nodes is a serious issue. Indeed, securing the routing protocols in Mobile Ad Hoc Network (MANET) is of paramount importance. A key exchange cryptography technique is one such protocol. Trust relationship between mobile nodes is essential. Without it, security will be further threatened. The absence of infrastructure and a dynamic topology changing reduce the performance of security and trust in mobile networks. Current proposed security solutions cannot cope with eavesdroppers and misbehaving mobile nodes. Practically, designing a key exchange cryptogra
APA, Harvard, Vancouver, ISO, and other styles
18

Shabut, Antesar Ramadan M. "Trust computational models for mobile ad hoc networks : recommendation based trustworthiness evaluation using multidimensional metrics to secure routing protocol in mobile ad hoc networks." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/7501.

Full text
Abstract:
Distributed systems like e-commerce and e-market places, peer-to-peer networks, social networks, and mobile ad hoc networks require cooperation among the participating entities to guarantee the formation and sustained existence of network services. The reliability of interactions among anonymous entities is a significant issue in such environments. The distributed entities establish connections to interact with others, which may include selfish and misbehaving entities and result in bad experiences. Therefore, trustworthiness evaluation using trust management techniques has become a significan
APA, Harvard, Vancouver, ISO, and other styles
19

Shabut, Antesar R. M. "Trust Computational Models for Mobile Ad Hoc Networks. Recommendation Based Trustworthiness Evaluation using Multidimensional Metrics to Secure Routing Protocol in Mobile Ad Hoc Networks." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/7501.

Full text
Abstract:
Distributed systems like e-commerce and e-market places, peer-to-peer networks, social networks, and mobile ad hoc networks require cooperation among the participating entities to guarantee the formation and sustained existence of network services. The reliability of interactions among anonymous entities is a significant issue in such environments. The distributed entities establish connections to interact with others, which may include selfish and misbehaving entities and result in bad experiences. Therefore, trustworthiness evaluation using trust management techniques has become a significan
APA, Harvard, Vancouver, ISO, and other styles
20

Rajendran, Rajapandiyan. "The Evaluation of GeoNetworking Forwarding in Vehicular Ad-Hoc Networks." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23982.

Full text
Abstract:
In Intelligent Transportation Systems (ITS), disseminating warning messages in a timely and efficient way through wireless short-range communications can save many lives and reduce traffic congestion. A geographical broadcast protocol provides data delivery to specified geographical areas, using multi-hop communications if needed. Among the main challenges for such protocols are forwarder selection and the reduction of the number of hops required to reach and cover the destination area.  In this thesis we propose an efficient geographical broadcast protocol called Preferred and Contention Base
APA, Harvard, Vancouver, ISO, and other styles
21

Bereketli, Alper. "On Qos Multicast Routing Routing Protocols." Master's thesis, METU, 2005. http://etd.lib.metu.edu.tr/upload/12606446/index.pdf.

Full text
Abstract:
Multicasting is a technique used for distributing data packets from one or more sources to a set of receivers on interconnected networks. Currently developing network applications bring specific quality of service (QoS) requirements like bounded delay, minimum bandwidth, and maximum data loss rate. Providing the required quality of service addresses routing and resource reservation concepts. In this study, a literature survey is carried out on traditional and QoS multicast routing protocols, and the need for QoS routing protocols is investigated. QoS multicast routing protocols are classified
APA, Harvard, Vancouver, ISO, and other styles
22

Shah, Syed Iftikhar Hussain, and Syed Hassan Shaheed. "PERFORMANCE EVALUATION OF MANET ROUTING PROTOCOLS." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1101.

Full text
Abstract:
The research study determines OPNET simulation to evaluate the MANET routing protocols i.e. AODV, DSR, GRP and OLSR performance for HTTP and FTP base application traffic. Results from the simulation result helps to measure the performance matrix i.e. packet delivery fraction, normalized routing load, throughput and end to end delay. Scalar values are extracted from simulation to plot desired performance graphs to analyze. The research results and conclusion produces enough information for the selection of best routing protocol for MANET in terms of HTTP and FTP application types.
APA, Harvard, Vancouver, ISO, and other styles
23

González, Martínez Santiago Renán. "Diseño de un Esquema Cross-Layer para el Balance entre Eficiencia Energética y Calidad de Servicio en la Transmisión de Tráfico Multimedia en Redes Ad-Hoc." Doctoral thesis, Universitat Politècnica de València, 2017. http://hdl.handle.net/10251/84284.

Full text
Abstract:
This thesis dissertation addresses the problem of energy constraints in ad hoc wireless networks. In this sort of networks nodes are generally powered by means of batteries, which involves significant limitations regarding the time of operation of devices. The nodes whose battery level describes important energy depletion represent potential elements for loss of connectivity, which results in an increase of packet loss rate. Therefore, the management of energy expenditure is one of the main research challenges to face in ad hoc networks, especially when developing applications in real scenario
APA, Harvard, Vancouver, ISO, and other styles
24

Ullah, Muhammad, and Waqar Ahmad. "Evaluation of Routing Protocols in Wireless Sensor Networks." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2500.

Full text
Abstract:
The evolution of wireless communication and circuit technology has enabled the development of an infrastructure consists of sensing, computation and communication units that makes administrator capable to observe and react to a phenomena in a particular environment. The building block of such an infrastructure is comprised of hundreds or thousands of small, low cost, multifunctional devices which have the ability to sense compute and communicate using short range transceivers known as sensor nodes. The interconnection of these nodes forming a network called wireless sensor network (WSN). The l
APA, Harvard, Vancouver, ISO, and other styles
25

Marinis, Artelaris Spyridon. "Performance evaluation of routing protocols for Wireless Mesh Networks." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-49745.

Full text
Abstract:
Wireless Mesh Networks provide an organisation or a community with the means to extend or create a network independent of infrastructure. However, the network’s dynamic topology along with the fact that devices in the network might be mobile and move randomly, brings tolight various kind of problems on the network, with the most common being the routing. In this report, the problem of routing is examined in terms of throughput, routing overhead, end-to-end delay and packet delivery ratio on two chosen algorithms, namely the Dynamic MANET On-demand (DYMO) and the Better Approach To Mobile Adhoc
APA, Harvard, Vancouver, ISO, and other styles
26

Pore, Ghee Lye. "A performance analysis of routing protocols for adhoc networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FPore.pdf.

Full text
Abstract:
Thesis (M.S. in Electrical Engineering)--Naval Postgraduate School, March 2006.<br>Thesis Advisor(s): John C. McEachen. "March 2006." Includes bibliographical references (p. 85-89). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
27

Wang, Yunsheng. "Designing Efficient Routing Protocols in Delay Tolerant Networks." Diss., Temple University Libraries, 2013. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/224066.

Full text
Abstract:
Computer and Information Science<br>Ph.D.<br>This thesis presents the design and evaluation of routing protocols for efficient content delivery and dissemination in delay tolerant networks. With the advancement in technology, the communication devices with wireless interfaces become more and more universal. Delay tolerant networks (DTNs) are characterized by intermittent connectivity and limited network capacity. There exist several different application scenarios: connectivity of developing countries, vehicular DTN road communications, and social contact networks. In this thesis, we explore t
APA, Harvard, Vancouver, ISO, and other styles
28

Lang, Daniel. "Routing protocols for mobile ad hoc networks classification, evaluation and challenges." Saarbrücken VDM Verlag Dr. Müller, 2006. http://d-nb.info/991215222/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Lychev, Robert D. "Evaluating security-enhanced interdomain routing protocols in full and partial deployment." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/52325.

Full text
Abstract:
The Internet consists of over 50 thousand smaller networks, called Autonomous Systems (ASes) (e.g., AT&T, Sprint, Google), that use the Border Gateway Protocol (BGP) to figure out how to reach each other. One way or another, we all rely on BGP because it is what glues the Internet together, but despite its crucial role, BGP remains vulnerable to propagation of bogus routing information due to malicious attacks or unintentional misconfigurations. The United States Department of Homeland Security (DHS) views BGP security as part of its national strategy for securing the Internet, and there is a
APA, Harvard, Vancouver, ISO, and other styles
30

Sivabalan, Muthurajah. "Design and performance evaluation of routing protocols for connection-oriented networks." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape17/PQDD_0006/NQ35978.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Ibrahim, Mohamed Elsaid Awad. "Performance evaluation of routing protocols in finding stable paths in vanet." Thesis, California State University, Los Angeles, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1586615.

Full text
Abstract:
<p> With the increase in technology, many developers have advanced their knowledge in improving road safety by designing various devices such as Vehicular AD Hoc Networks (VANETs). These VANETs are important in ensuring there is a continuous vehicle-to-vehicle communication along the roads while at close range in order to prevent road accidents. Similarly, VANETS are meant to ensure vehicles are alerted of events occurring at their surrounding through information sharing between vehicles to other vehicles (V2V) and vehicles to stationary objects built along the roads (V2I). However, MAC sub-la
APA, Harvard, Vancouver, ISO, and other styles
32

Guercin, Sergio Rolando. "Performance Evaluation of Opportunistic Routing Protocols for Multi-hop Wireless Networks." Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/38904.

Full text
Abstract:
Nowadays, Opportunistic Routing (OR) is widely considered to be the most important paradigm for Multi-hop wireless networks (MWNs). It exploits the broadcast nature of wireless medium to propagate information from one point to another within the network. In OR scheme, when a node has new information to share, it rst needs to set its forwarding list which include the IDs and/or any relevant information to its best suited neighboring nodes. This operation is supported by the use of appropriate metrics. Then, it executes a coordination algorithm allowing transmission reliability and high t
APA, Harvard, Vancouver, ISO, and other styles
33

Hequn, Zhang, and Wang Rui. "SIMULATION-BASED PERFORMANCE COMPARISONS OF GEOCAST ROUTING PROTOCOLS." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-25768.

Full text
Abstract:
Intelligent Transportation System (ITS)  is the main research domain for making road transport safer and more comfortable. For the sake of increasing the benefits of ITS, projects about Inter-Vehicle Communication (IVC)  system have been proposed to make communications among vehicles possible, to exchange traffic information and avoid accidents. In order to create communication network among vehicles or between vehicles and infrastructure,  Vehicular Ad hoc Networks (VANETs) has been proposed. Many applications in VANETs need to send messages to vehicles within a specific geographic region. Th
APA, Harvard, Vancouver, ISO, and other styles
34

Lacks, Daniel Jonathan. "MODELING, DESIGN AND EVALUATION OF NETWORKING SYSTEMS AND PROTOCOLS THROUGH SIMULATION." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3792.

Full text
Abstract:
Computer modeling and simulation is a practical way to design and test a system without actually having to build it. Simulation has many benefits which apply to many different domains: it reduces costs creating different prototypes for mechanical engineers, increases the safety of chemical engineers exposed to dangerous chemicals, speeds up the time to model physical reactions, and trains soldiers to prepare for battle. The motivation behind this work is to build a common software framework that can be used to create new networking simulators on top of an HLA-based federation for distributed s
APA, Harvard, Vancouver, ISO, and other styles
35

Kioumourtzis, Georgios A. "Simulation and evaluation of routing protocols for Mobile Ad Hoc Networks (MANETs)." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FKioumourtzis.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Engineering and M.S. in Computer Science)--Naval Postgraduate School, September 2005.<br>Thesis Advisor(s): Gilbert M. Lundy, Rex Buddenberg. Includes bibliographical references (p.133-135). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
36

Elhabyan, Riham. "Clustering and Routing Protocols for Wireless Sensor Networks: Design and Performance Evaluation." Thesis, Université d'Ottawa / University of Ottawa, 2015. http://hdl.handle.net/10393/33128.

Full text
Abstract:
In this thesis, we propose a suite of Evolutionary Algorithms (EA)-based protocols to solve the problems of clustering and routing in Wireless Sensor Networks (WSNs). At the beginning, the problem of the Cluster Heads (CHs) selection in WSNs is formulated as a single-objective optimization problem. A centralized weighted-sum multi-objective optimization protocol is proposed to find the optimal set of CHs. The proposed protocol finds a predetermined number of CHs in such way that they form one-hop clusters. The goal of the proposed protocol is to enhance the network's energy efficiency, data de
APA, Harvard, Vancouver, ISO, and other styles
37

Bai, Rendong. "ROUTING IN MOBILE AD-HOC NETWORKS: SCALABILITY AND EFFICIENCY." UKnowledge, 2008. http://uknowledge.uky.edu/gradschool_diss/580.

Full text
Abstract:
Mobile Ad-hoc Networks (MANETs) have received considerable research interest in recent years. Because of dynamic topology and limited resources, it is challenging to design routing protocols for MANETs. In this dissertation, we focus on the scalability and efficiency problems in designing routing protocols for MANETs. We design the Way Point Routing (WPR) model for medium to large networks. WPR selects a number of nodes on a route as waypoints and divides the route into segments at the waypoints. Waypoint nodes run a high-level inter-segment routing protocol, and nodes on each segment run a lo
APA, Harvard, Vancouver, ISO, and other styles
38

Ibrahim, Mouhamad. "Routing and performance evaluation of disruption tolerant networks." Nice, 2008. http://www.theses.fr/2008NICE4096.

Full text
Abstract:
Cette thèse comprend deux parties. La première partie de la thèse focalise principalement sur l'évaluation de protocoles de routage dans les réseaux tolérants aux perturbations quand ces réseaux incluent des relais fixes, appelées boîtes. Dans un premier temps, nous montrons au travers des simulations que les instants successifs de rencontre entre une boîte et un noeud mobile qui se déplace selon un modèle de mobilité aléatoire sont bien approximés par un processus de Poisson. Nous donnons une formule explicite approchée pour l'intensité de ce processus qui dépend notamment de la densité de pr
APA, Harvard, Vancouver, ISO, and other styles
39

CORDEIRO, CARLOS DE MORAIS. "MEDIUM ACCESS CONTROL PROTOCOLS AND ROUTING STRATEGIES FOR WIRELESS LOCAL AND PERSONAL AREA NETWORKS." University of Cincinnati / OhioLINK, 2003. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1070579302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Yilmaz, Semra. "Performance Evaluation Of Routing Protocols In Wireless Ad Hoc Networks With Service Differentiation." Master's thesis, METU, 2003. http://etd.lib.metu.edu.tr/upload/1208909/index.pdf.

Full text
Abstract:
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any fixed network infrastructure or centralized administration. Due to the limitations in the wireless environment, it may be necessary for one mobile host to enlist the aid of other hosts in forwarding a packet to its destination. In order to enable communication within the network, a routing protocol is needed to discover routes between nodes. The primary goal of ad hoc network routing protocols is to establish routes between node pairs so that messages may be delivered relia
APA, Harvard, Vancouver, ISO, and other styles
41

Lundgren, Henrik. "Implementation and real-world evaluation of routing protocols for wireless ad hoc networks." Licentiate thesis, Uppsala universitet, Avdelningen för datorteknik, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-86380.

Full text
Abstract:
A wireless ad hoc network consists of a number of mobile nodes that temporarily form a dynamic infrastructure-less network. To enable communication between nodes that do not have direct radio contact, each node must function as a wireless router and potentially forward data traffic on behalf of the others. New routing protocols are needed as the existing protocols used in wired networks adapt too slowly to the frequent topology changes induced by mobility and are inefficient in terms of resource consumption. During the last five to ten years more than 60 different ad hoc routing protocols have
APA, Harvard, Vancouver, ISO, and other styles
42

Qayyum, Amir. "Analysis and evaluation of channel access schemes and routing protocols in wireless LANS." Paris 11, 2000. http://www.theses.fr/2000PA112262.

Full text
Abstract:
Cette these s'interesse a deux problemes majeurs dans le domaine des reseaux mobiles sans fil : - l'acces multiple au canal, - le routage dynamique. Le choix d'un protocole d'acces multiple qui permet a des utilisateurs geographiquement repartis et mobiles de partager un canal commun est tres important pour une utilisation efficace et equitable de la bande passante disponible. La these presente differents mecanismes d'acces multiple et analyse ensuite plus finement csma (carrier sense multiple access). Elle decrit la technique de signalisation active qui est une amelioration de csma. Elle comp
APA, Harvard, Vancouver, ISO, and other styles
43

Yang, Shah-an. "Development and evaluation of methodologies for vulnerability analysis of ad-hoc routing protocols." College Park, Md.: University of Maryland, 2007. http://hdl.handle.net/1903/7744.

Full text
Abstract:
Thesis (Ph. D.) -- University of Maryland, College Park, 2007.<br>Thesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
44

Friginal, López Jesús. "An experimental methodology to evaluate the resilience of ad hoc routing protocols." Doctoral thesis, Editorial Universitat Politècnica de València, 2013. http://hdl.handle.net/10251/18483.

Full text
Abstract:
Friginal López, J. (2013). An experimental methodology to evaluate the resilience of ad hoc routing protocols [Tesis doctoral]. Editorial Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/18483<br>Palancia
APA, Harvard, Vancouver, ISO, and other styles
45

Wang, Guoqiang. "MAC LAYER AND ROUTING PROTOCOLS FOR WIRELESS AD HOC NETWORKS WITH ASYMMETRIC LINKS AND PERFORMANCE EVALUATION STUDIES." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3402.

Full text
Abstract:
In a heterogeneous mobile ad hoc network (MANET), assorted devices with different computation and communication capabilities co-exist. In this thesis, we consider the case when the nodes of a MANET have various degrees of mobility and range, and the communication links are asymmetric. Many routing protocols for ad hoc networks routinely assume that all communication links are symmetric, if node A can hear node B and node B can also hear node A. Most current MAC layer protocols are unable to exploit the asymmetric links present in a network, thus leading to an inefficient overall bandwidth util
APA, Harvard, Vancouver, ISO, and other styles
46

Ma, Wei Hong. "Performance Evaluation and Comparison of Routing Protocols in Wireless Sensor Network with Mobile Sinks." Thesis, University of Ottawa (Canada), 2010. http://hdl.handle.net/10393/28770.

Full text
Abstract:
Wireless Sensor Networks (WSNs) usually consist of a large number of sensors which have the ability to detect events, generate reports and transmit them to the sink which collects the data reports. The mobile sink has been adopted to improve network performance of WSNs. It is necessary to inform sensors of a topological or location change of a moving sink, however frequent location updates from mobile sinks can lead to high energy consumption of sensors, and therefore shorten the network lifetime. Many protocols have been proposed in the past few years trying to achieve the energy efficiency g
APA, Harvard, Vancouver, ISO, and other styles
47

Asker, Zada Salar. "Ad Hoc Networks : Performance Evaluation Of Proactive, Reactive And Hybrid Routing Protocols In NS2." Thesis, Högskolan Väst, Institutionen för ekonomi och it, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-2778.

Full text
Abstract:
No infrastructure, no centralized administration and self-configuration are the main characteristics of MANETs. The primary motivation of MANET deployment is to increase portability, mobility and flexibility. However, this mobility causes an unpredictable change in topology and makes routing more difficult. Many routing algorithms have been proposed and tested over the last few years in order to provide an efficient routing in Ad Hoc networks. In this report we will show our conducted study with AODV (reactive), DSDV (proactive) and ZRP (hybrid) routing protocols. The performance of routing pr
APA, Harvard, Vancouver, ISO, and other styles
48

Bohannan, Chad Brian. "Performance evaluation of routing protocols for QOS support in rural mobile ad hoc networks." Thesis, Montana State University, 2008. http://etd.lib.montana.edu/etd/2008/bohannan/BohannanC0508.pdf.

Full text
Abstract:
We evaluate several routing protocols, and show that the use of bandwidth and delay estimation can provide throughput and delay guarantees in Mobile Ad Hoc Networks (MANETs). This thesis describes modifications to the Dynamic Source Routing (DSR) protocol to implement the Quality Aware Source Routing (QASR) network routing protocol operating on an 802.11e link layer. QASR network nodes exchange node location and flow reservation data periodically to provide information necessary to model and estimate both the available bandwidth and the end-to-end delay of available routes during route discove
APA, Harvard, Vancouver, ISO, and other styles
49

Fredriksson, Tony, and Niklas Ljungberg. "Security in low power wireless networks : Evaluating and mitigating routing attacks in a reactive, on demand ad-hoc routing protocol." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-145362.

Full text
Abstract:
Using low energy devices to communicate over the air presents many challenges to reach security as resources in the world of Internet Of Things (IoT) are limited. Any extra overhead of computing or radio transmissions that extra security might add affects cost of both increased computing time and energy consumption which are all scarce resources in IoT. This thesis details the current state of security mechanisms built into the commercially available protocol stacks Zigbee, Z-wave, and Bluetooth Low Energy, and collects implemented and proposed solutions to common ways of attacking systems bui
APA, Harvard, Vancouver, ISO, and other styles
50

Saghar, Malik Kashif. "The formal evaluation and design of routing protocols for wireless sensor networks in hostile environments." Thesis, Northumbria University, 2010. http://nrl.northumbria.ac.uk/222/.

Full text
Abstract:
Wireless Sensor Networks (WSNs) have attracted considerable research attention in recent years because of the perceived potential benefits offered by self-organising, multi-hop networks consisting of low-cost and small wireless devices for monitoring or control applications in di±cult environments. WSN may be deployed in hostile or inaccessible environments and are often unattended. These conditions present many challenges in ensuring that WSNs work effectively and survive long enough to fulfil their functionalities. Securing a WSN against any malicious attack is a particular challenge. Due to
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!